{"id":197219,"date":"2025-09-03T16:11:13","date_gmt":"2025-09-03T16:11:13","guid":{"rendered":"https:\/\/www.europesays.com\/us\/197219\/"},"modified":"2025-09-03T16:11:13","modified_gmt":"2025-09-03T16:11:13","slug":"google-fixes-actively-exploited-android-flaws-in-september-update","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/197219\/","title":{"rendered":"Google fixes actively exploited Android flaws in September update"},"content":{"rendered":"<p style=\"text-align:center\"><img loading=\"lazy\" decoding=\"async\" alt=\"Android\" height=\"897\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/09\/Android.jpg\" width=\"1600\"\/><\/p>\n<p>Google has released the September 2025 security update for Android devices, addressing a total of 84 vulnerabilities, including two actively exploited flaws.<\/p>\n<p>The two flaws that were detected as exploited in zero-day attacks are <strong>CVE-2025-38352<\/strong>, an elevation of privilege in the Android kernel, and <strong>CVE-2025-48543<\/strong>, also an elevation of privilege problem in the Android Runtime component.<\/p>\n<p>Google <a href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/2025-09-01\" target=\"_blank\" rel=\"nofollow noopener\">noted in its bulletin<\/a> that there are indications that those two flaws may be under limited, targeted exploitation, without sharing any more details.<\/p>\n<p>The\u00a0<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-38352\" target=\"_blank\" rel=\"nofollow noopener\">CVE-2025-38352<\/a> flaw is a Linux kernel flaw first disclosed on July 22, 2025, fixed in kernel versions 6.12.35-1 and later. It was not previously marked as actively exploited.<\/p>\n<p>The flaw is a race condition in POSIX CPU timers, allowing task cleanup disruption and kernel destabilization, potentially leading to crashes, denial of service, and privilege escalation.<\/p>\n<p>CVE-2025-48543 impacts the Android Runtime, where Java\/Kotlin apps and system services execute. It potentially allows a malicious app to bypass sandbox restrictions and access higher-level system capabilities.<\/p>\n<p>Apart from the two actively exploited flaws, Google&#8217;s September 2025 update for Android also addresses four critical-severity problems.<\/p>\n<p>The first is <strong>CVE-2025-48539<\/strong>, a remote code execution (RCE) problem in Android&#8217;s System component.<\/p>\n<p>It allows an attacker within physical or network proximity, such as Bluetooth or WiFi range, to execute arbitrary code on the device without any user interaction or privileges.<\/p>\n<p>The other three critical flaws are <strong>CVE-2025-21450<\/strong>, <strong>CVE-2025-21483<\/strong>, and <strong>CVE-2025-27034<\/strong>, all of which impact Qualcomm&#8217;s proprietary components.<\/p>\n<p>According to additional details provided by <a href=\"https:\/\/docs.qualcomm.com\/product\/publicresources\/securitybulletin\/september-2025-bulletin.html\" target=\"_blank\" rel=\"nofollow noopener\">Qualcomm via its bulletin<\/a>, CVE-2025-21483 is a memory corruption flaw in the data network stack that occurs when reassembling video (NALUs) from RTP packets.<\/p>\n<p>Attackers can send specially crafted network traffic that triggers out-of-bounds writes, allowing remote code execution without user interaction.<\/p>\n<p>CVE-2025-27034 is an array index validation bug in the multi-mode call processor during PLMN selection from the SOR failed list.<\/p>\n<p>Malicious or malformed network responses can corrupt memory and enable code execution in the modem baseband.<\/p>\n<p>In total, this Android patch release incorporates fixes for 27 Qualcomm components, bringing the total number of fixed flaws to 111. However, these aren&#8217;t relevant to devices running on chips from other manufacturers.<\/p>\n<p>For MediaTek-powered devices, details about the latest security fixes are available on the chip <a href=\"https:\/\/corp.mediatek.com\/product-security-bulletin\/September-2025\" target=\"_blank\" rel=\"nofollow noopener\">vendor&#8217;s bulletin<\/a>.<\/p>\n<p>This latest Android security update covers vulnerabilities impacting Android 13 through 16, though not all flaws impact every version of the mobile OS.<\/p>\n<p>The recommended action is to upgrade to security patch level 2025-09-01 or 2025-09-05 by navigating <strong>Settings &gt; System &gt; Software updates &gt; System update &gt;<\/strong> and clicking &#8216;<strong>Check for update<\/strong>.&#8217;<\/p>\n<p>Users running Android 12 and earlier should replace their device with a newer model that is actively supported, or use a third-party Android distribution that incorporates the latest security updates.<\/p>\n<p>Samsung has also released its <a href=\"https:\/\/security.samsungmobile.com\/securityUpdate.smsb\" target=\"_blank\" rel=\"nofollow noopener\">September maintenance update<\/a> for its flagship devices, including fixes for flaws specific to its custom components, such as One UI.<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03B5Kw_0\" target=\"_blank\" rel=\"noopener sponsored nofollow\"><br \/>\n            <img decoding=\"async\" src=\"https:\/\/www.europesays.com\/us\/wp-content\/uploads\/2025\/08\/blue-report-2025.jpg\" alt=\"Picus Blue Report 2025\"\/><br \/>\n        <\/a><\/p>\n<p>46% of environments had passwords cracked, nearly doubling from 25% last year.<\/p>\n<p>Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.<\/p>\n<p>        <a href=\"https:\/\/hubs.li\/Q03B5Kw_0\" target=\"_blank\" rel=\"noopener sponsored nofollow\">Get the Blue Report 2025<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Google has released the September 2025 security update for Android devices, addressing a total of 84 vulnerabilities, including&hellip;\n","protected":false},"author":3,"featured_media":197220,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[611,158,67,132,68],"class_list":{"0":"post-197219","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-mobile","8":"tag-mobile","9":"tag-technology","10":"tag-united-states","11":"tag-unitedstates","12":"tag-us"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115141245917668734","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/197219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=197219"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/197219\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/197220"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=197219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=197219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=197219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}